Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
101 - 125 of 529 Matches Previous Page  | Next Page
Understanding Your PCI DSS Guidelines: Successes and Failures
sponsored by SearchSecurity.com
EGUIDE: This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

SearchSecurity.com

Why It’s Critical to Begin the Process of Unifying Physical and Electronic Records—Now!
sponsored by Iron Mountain
WHITE PAPER: Consult this expert white paper to uncover how to successful unify physical and electronic records. Discover the benefits and challenges with unification, and most importantly, learn what you can do to rive higher business value through this process.
Posted: 26 Nov 2013 | Published: 02 Dec 2013

Iron Mountain

Top Monitoring Tools to Help Meet Regulatory Compliance Standards
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

SearchSecurity.com

The trust advantage: How to win at big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

COBIT5 For Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is a preview of a  report from ISACA offering guidance on how to use the COBIT 5 framework to establish the risk governance and management functions for the enterprise.
Posted: 01 Nov 2013 | Published: 19 Nov 2013

ComputerWeekly.com

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

Moving Up the Software License Optimization Maturity Curve to Drive Business Value
sponsored by Flexera Software
WHITE PAPER: Defining and implementing a strategy for software asset management (SAM) and license optimization isn't easy -- but with the right tools and processes, it's definitely possible. Access this informative resource to explore the common challenges of SAM, and how you can ensure your software license optimization program is on its way to full maturity.
Posted: 18 Oct 2013 | Published: 28 Feb 2013

Flexera Software

A Practical Approach to Building a Comprehensive and Compliant RIM Program
sponsored by Iron Mountain
WHITE PAPER: This whitepaper outlines the important steps to achieve successful and compliant records and information management (RIM).
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Iron Mountain

Crafting a Secure Approach to Mobility and Compliance
sponsored by SearchConsumerization.com
EBOOK: This expert resource discusses key security features that need to be addressed when creating an effective mobile strategy, including how you can ensure compliance. Read on and learn about crucial topics such as encryption, data protection, and mobile application management.
Posted: 25 Sep 2013 | Published: 25 Sep 2013


HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

SearchSecurity.com

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

Identify and Destroy: Your Two-Step Ticket to Easier Information Compliance
sponsored by Iron Mountain
WHITE PAPER: This brief white paper provides a two-step ticket to easier information compliance. Discover three steps to speed and recovery and how to identify and destroy data that is no longer relevant to your business needs.
Posted: 30 Aug 2013 | Published: 16 Jun 2013

Iron Mountain

Breaking Through The Value Ceiling
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, gain information to determine whether your governance, risk and compliance (GRC) tools have yet to maximize their full value, and discover 3 ways that you can go beyond to bring significant ROI.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

RSA, The Security Division of EMC

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Contract management's effect on In-house counsel
sponsored by IBM
WHITE PAPER: Access this white paper to discover how to gain 100% contract lifecycle visibility, mitigate risks, enforce compliance, and much more.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

IBM

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute Software

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Using a Gateway to achieve PCI compliance
sponsored by Forum Systems
WHITE PAPER: This exclusive resource examines a gateway product that can help your organization achieve PCI compliance.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Forum Systems

Rules, risk and the potential for profit in the world of Basel III
sponsored by IBM
WHITE PAPER: Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

Security University: GRC Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans
Posted: 27 Sep 2013 | Premiered: 05 Jul 2013

SearchCompliance.com

An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER: Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

IBM

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Computer Weekly special report: Mobile device management and the importance of absolute compliance
sponsored by BlackBerry
WHITE PAPER: Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

BlackBerry
101 - 125 of 529 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement